-
Notifications
You must be signed in to change notification settings - Fork 711
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
even you enable secrity .trusted_dir can be bypassed #486
Comments
This bug has already been fixed in the master branch since 3.1.33-dev-4 |
This issue got CVE-2018-16831 assigned. |
Version 3.1.33 covering the issue has just been released. |
@uwetews , Is this the fix for CVE-2018-16831 87ec44e |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
if you enable secrity .$trusted_dir is an array of all directories that are considered trusted. Trusted directories are where you keep php scripts that are executed directly from the templates . the attackers can use ../ to bypass the dir ,if they can editing the templates, they read any file they want. just use {include "file:./../../../../../etc/passwd"}
The text was updated successfully, but these errors were encountered: